Figure 3 - uploaded by Mubarak Albarka Umar
Content may be subject to copyright.
Facial Recognition Surveillance

Facial Recognition Surveillance

Source publication
Article
Full-text available
Over the years, insecurity and crime have been significant issues in Nigeria. While the country successfully dealt with the past insecurity challenges conventionally, the government has failed to contain the new insecurity and crime challenges, especially that of the well-known Boko Haram lingering for over a decade now. This is due to various reas...

Context in source publication

Context 1
... with a history of crime can be redflagged; the system keeps track and automatically detects flagged criminals' faces via CCTV footage and alerts concerned authorities. A sample Figure 3 of the facial recognition surveillance capturing live streaming footage can be analyzed using algorithms through comparing the images stored in the database (Palmer,2018); in case of images with high noise, Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA), or a combination of both can be used to improve quality of the image (Shivam et al., 2018). Similarly, images taken in a controlled environment can be enhanced using edge detection techniques (Shivam et al., 2018;Chetna et al., 2014). ...

Similar publications

Article
Full-text available
The paper proposes a framework to record meeting to avoid hassle of writing points of meeting. Key components of framework are “Model Trainer” and “Meeting Recorder”. In model trainer, we first clean the noise in audio, then oversample the data size and extract features from audio, in the end we train the classification model. Meeting recorder is a...
Article
Full-text available
Learning Japanese can enhance competitiveness in a globalized economy, and we address the problems of poor open-source Japanese language teaching, cumbersome teaching tasks, and a single teaching model. We propose a hybrid Japanese teaching aid system with multiple information fusion mapping, which can effectively improve the efficiency of Japanese...
Article
Full-text available
Error detection and accuracy estimation in automated speech recognition (ASR) systems act a vital part in the design of human-computer spoken dialogue systems, as recognition error can hamper accurate systems in understanding the end user intentions. The major aim is to identify the errors in an utterance, and therefore, the dialogue manager can pr...
Article
Full-text available
Voice recognition technology is an automated science technology that transforms the input voice information into corresponding patterns or text information after being processed by a machine. The rapid development of artificial intelligence has made speech recognition technology in this field received widespread attention and attention, and speech...
Preprint
Full-text available
Machine learning is used nowadays in several fields, one of them is speech recognition. Controlling devices with our speech, recognising the music we hear, creating subtitles for a video based on the audio, we use more and more features related to speech and voice recognition. In general, we are glad to use such technology-in those cases when it pr...

Citations

... Global efforts to tackle violent crimes have intensified. This development has prompted countries around the world to implement various measures to curb violent crimes [10,11]. These initiatives include enhancing law enforcement agencies, promoting community engagement, technological approach, and investing in education and social programs. ...
... Voice recognition technology is an effective tool in fighting violent crimes at homes [15][16][17]. Voice recognition technology allows for the identification and verification of individuals based on their unique vocal characteristics [11,18,19]. Voice recognition can be integrated with artificial intelligence and natural language processing, to enhance overall crime detection capabilities. ...
Article
Full-text available
Violent crime cases which include, robbery, rape, and homicide are terribly on the rise, and the role of security in combating this menace cannot be overemphasized. This research presents a security device that aims at fighting violent crimes using voice recognition technology. The work also tends to solve the issue of network downtime when the user is out of reach for help in time of attack. In this work, a voice processing unit which comprises the condenser microphone, an amplifier, a shift register, and a timer was designed. The processing unit circuit was incorporated into microcontrollers which create Human-Device interaction and the GSM communication unit which is made up of two GSM modules. The two microcontrollers used in the design are PIC18F4520 and PIC16F873A. The microcontrollers were programmed with C++ using the MPLAB IDE software and the circuit simulation was done using Proteus Design Suite version 8. The result shows that the appropriate authority receives SMS whenever the pre-recorded code is mentioned. The result also shows that during network downtime, the second GSM module sends an SMS to the appropriate authority. Evaluating the performance of this work, it was observed that the device works best in a calm area compared to a noisy area. This work is designed to work in domestic areas like homes, offices, malls, and mainly areas free from so much noise. Therefore, this work has successfully reduced the crime rate in emergencies.
... ICT is an integration of hardware, software, networks, and media for collecting, storing, disseminating and presenting of information (data, text, images, voice), and other services that are related. Numerous research on the use of ICT tools or innovative technological method to mitigate security challenges in Nigeria has been done such research include the work of (Oludare et al., 2015); (Adams, 2016); (James & Saraso, 2016); (Sulaiman et al., 2018); (Abiodun, 2020); (Umar et al., 2021). ...
... More so, in (Umar et al., 2021), the used of new technologies instead of using the conventional method in fighting the recent insecurities and crimes in Nigeria was discussed. This study proposed the use of a Central Database as a support model serving as main point of reference for all law enforcement agencies. ...
... Thus, the tools in the frame are utilized in National Database synchronization (Umar et al., 2021). They are also utilized in the creation of information management systems such as Integrated Ballistics Information Systems (IBIS), Traffic Ticketing Information System (TTIS), and Crime and Information Management System (CIMS) (Oludare et al., 2015), for easy identification and tracking of criminals, to detect fire arms used in committing crimes by criminals, keep records of related traffic offenders and having the records of the criminals respectively. ...
Conference Paper
Full-text available
Today, insecurity is a major menace that many nations are faced with particularly, Nigeria. This directly or indirectly hampered the economic growth and consequently, has an advanced effect on its citizens. The use of Artificial Intelligence (AI) technology techniques such as the use of Information and Communication Technology (ICT) tools is the only solution for the recent insecurity occurrences in the country. These must be adopted to transform every sector of the nation's traditional activities and processes. The use of ICT tools as measures in providing solutions to insecurity challenges that face humanity and society has proven successful globally. A lot of research has been done on the use of information technology (IT) and ICT in combating security challenges nationally and internationally. However, there is no ICT framework particularly conceptual, designed that encompasses all the relevant tools needed in combating the insecurity challenges in Nigeria. Hence, this paper proposes to identify the relevant ICT tools needed to achieve that as one of its objectives. Two, to design and develop a framework for it. The framework is organized in a logical way to assist provide a picture of how the ICT tools relate to one another to proffer solutions to the aforementioned problem. The framework is aimed at making research results more meaningful, acceptable to the theoretical concepts in the research field, and guarantees generalization. The framework can also serve as a guide for solving novel, emergent practical issues as regards to insecurity. Research that is not based on either theoretical or conceptual framework, makes it difficult for readers in determining the academic position and direction of the research. Hence, this will renders the research not appealing as contributing meaningfully to the body of knowledge (BoK). Achieving such framework can serve as the novelty and main contribution of this research paper.
Article
Full-text available
Crime prevention and detection are critical components of public safety in any nation. Traditionally, crime prevention and detection approaches relied on human intuition and limited data, resulting in reactive and resource-intensive methods. However, recent advancements in artificial intelligence (AI) offer a paradigm shift, enabling proactive, data-driven approaches. This study explores the evolution from conventional crime prevention and detection methods to cutting-edge AI solutions. It employs a literature survey, local observation, and global news approach to examine the current state of the art in AI-driven approaches. Traditional crime prevention methods, such as neighbourhood watch programs, random stop-and-search initiatives, and foot patrols, are examined alongside technological approaches, such as surveillance systems, crime mapping, and geographical profiling. These conventional techniques are tedious and time-consuming leading to inefficiency. Findings from the study revealed that AI has the potential to revolutionize crime prevention and detection through its subfields, such as machine learning and computer vision. Machine learning algorithms can process large amounts of data to forecast potential criminal activity, thus transforming law enforcement operations. Also, computer vision models can utilise visual data from surveillance cameras and other sources to analyse, identify, and respond to crimes. The study recommends the integration of AI into law enforcement agencies for crime prevention and detection to transform societal security. In addition, it emphasizes the need for further research in this domain. The study also recommends the development of an efficient framework and model for crime detection based on deep learning to enhance public safety.